Goodreads helps you keep track of books you want to read.
Start by marking “Extrusion Detection: Security Monitoring for Internal Intrusions” as Want to Read:
Extrusion Detection: Security Monitoring for Internal Intrusions
Enlarge cover
Rate this book
Clear rating
Open Preview

Extrusion Detection: Security Monitoring for Internal Intrusions

4.21 of 5 stars 4.21  ·  rating details  ·  29 ratings  ·  4 reviews
Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software. Hardening your network perimeter won't solve this problem. You must systematically protect c ...more
Paperback, 385 pages
Published November 1st 2005 by Addison-Wesley Professional
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Extrusion Detection, please sign up.

Be the first to ask a question about Extrusion Detection

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 72)
filter  |  sort: default (?)  |  rating details
Josh Brower
“This is my 2nd book by Bejtlich that I have read, with the first being “The Tao of Network Security Monitoring: Beyond Intrusion Detection.” While the Tao of NSM focused mainly on detecting attacks coming in from the perimeter, this book focused on Network Security Monitoring principles as applied to traffic going out of the network.
Bejtlich starts out by doing an overview of Network Security Monitoring, referencing his earlier book as a more in-depth treatise on NSM. He then goes on to the the
...more
Jon
Let's hear it for another exceptionally well written book on network monitoring. Aside from a very clear
and easy to understand writing style, Richard hits home with practicality and rich detail. I've become
a big fan of his writings including those on his informative blog, http://taosecurity.blogspot.com/.

First, the praise.New material, different from that in Tao his former book, includes a more extensive look
at taps, along with defense and mitigation ( and lots of it), querying NMS data from dat
...more
Anthony
Good follow up to The Tao of Network Security Monitoring. The chapters on Network Incident Response and Network Forsensics were the most informative for me.
Jimboninja
This book is readable and useful, but in the end I think if you've carefully read "The Tao of NSM", then you've gotten all the information you're going to from both books...
Brian
Brian marked it as to-read
Aug 10, 2015
Dana Mohamad
Dana Mohamad marked it as to-read
Jul 30, 2015
Sarada
Sarada marked it as to-read
Jul 14, 2015
Satish Patnala
Satish Patnala marked it as to-read
Jul 14, 2015
Tkachev Eugene
Tkachev Eugene marked it as to-read
Jun 29, 2015
Iain
Iain marked it as to-read
May 05, 2015
Franck
Franck is currently reading it
Apr 22, 2015
ns
ns marked it as to-read
Mar 22, 2015
Qasim
Qasim marked it as to-read
Feb 16, 2015
Telorian
Telorian marked it as to-read
Feb 10, 2015
James
James added it
Dec 15, 2014
Elaine Hales
Elaine Hales marked it as to-read
Nov 14, 2014
Britt Freeman
Britt Freeman marked it as to-read
Oct 08, 2014
James
James marked it as to-read
Sep 30, 2014
Mark
Mark marked it as to-read
Apr 26, 2014
Mike Boya
Mike Boya marked it as to-read
Mar 07, 2014
Alex
Alex marked it as to-read
Dec 31, 2013
Jimmy
Jimmy marked it as to-read
Nov 05, 2013
« previous 1 3 next »
There are no discussion topics on this book yet. Be the first to start one »
The Tao of Network Security Monitoring: Beyond Intrusion Detection The Practice of Network Security Monitoring: Understanding Incident Detection and Response Tao of Network Security Monitoring: Beyond Intrusion Detection Real Digital Forensics: Computer Security and Incident Response Computer Forensics Library Boxed Set

Share This Book